Node.js has issued urgent updates to address a serious vulnerability that affects nearly all production applications using the platform. The flaw, related to the async_hooks module, can lead to a stack overflow, resulting in a denial-of-service (DoS) condition. This means that if attackers exploit this vulnerability, they could crash servers running affected applications, disrupting services. Developers and companies using Node.js should prioritize applying these patches to maintain service availability and prevent potential outages. The vulnerability is especially concerning because it touches on core functionality that many frameworks rely on for stability.
Articles tagged "Vulnerability"
Found 517 articles
SCM feed for Latest
A serious vulnerability has been identified in multiple versions of the Apache Struts 2 framework, tracked as CVE-2025-68493. This XML external entity injection flaw could allow attackers to gain unauthorized access to sensitive data, cause denial-of-service attacks, or execute server-side request forgery (SSRF) attacks. Organizations using affected versions of Apache Struts 2 are at risk, which could lead to significant data breaches and disruptions. The issue emphasizes the need for developers and system administrators to ensure their applications are updated and secure against such vulnerabilities. Immediate action is necessary to mitigate potential exploitation.
SCM feed for Latest
The Cybersecurity and Infrastructure Security Agency (CISA) has added a serious vulnerability in the open-source Git service Gogs to its Known Exploited Vulnerabilities catalog. This flaw, identified as CVE-2025-8110, is a path traversal issue that attackers are actively exploiting. Organizations using Gogs should be particularly vigilant, as this vulnerability allows unauthorized access to sensitive files on affected systems. The inclusion in CISA's catalog highlights the urgency for users to address this issue promptly, as it can lead to significant security breaches if not mitigated. Companies relying on Gogs for version control must prioritize patching this vulnerability to protect their data.
ServiceNow has revealed a significant vulnerability linked to its legacy chatbot, which has recently been upgraded with agentic AI capabilities. This flaw has put customer data and connected systems at risk, potentially allowing unauthorized access and exploitation. The issue arises from the integration of AI into an older system that lacked adequate security measures. As a result, businesses using ServiceNow's platform may face serious data breaches if the vulnerability is not addressed promptly. This incident serves as a crucial reminder for companies to continually assess the security of their systems, especially when implementing new technologies.
Central Maine Healthcare (CMH) suffered a significant data breach last year, compromising the personal information of over 145,000 individuals. The breach exposed sensitive data, including names, birth dates, Social Security numbers, and medical records, raising concerns about identity theft and privacy violations. CMH has stated that they are taking steps to enhance their security measures, but the incident underscores the vulnerability of healthcare organizations to cyber attacks. Affected individuals have been advised to monitor their accounts for any suspicious activity. This breach serves as a reminder of the importance of robust data protection in the healthcare sector, where sensitive information is frequently targeted by cybercriminals.
SCM feed for Latest
Hackers have reportedly leaked parts of Target's internal source code and developer documentation on Gitea, a self-hosted Git service. The threat actor created multiple repositories that allegedly contain sensitive information related to Target's operations. This incident raises significant concerns about the security of Target's systems and the potential misuse of the leaked code. If the claims are verified, it could lead to increased vulnerability for Target and its customers, as attackers may exploit the leaked information to launch further attacks or create malicious software. Companies need to be vigilant about their internal data security to prevent such leaks from occurring.
ServiceNow has addressed a significant flaw in its AI platform that could allow attackers to impersonate users. The company claims there is no evidence that this vulnerability was exploited before the patch was released in October. However, security researchers warn that the configuration of AI agents could still lead to prompt-injection style abuses, which could potentially compromise user accounts. This situation raises concerns about the security of AI systems and the risks they pose if not properly configured. Organizations using ServiceNow's AI features should ensure they implement the latest updates to mitigate any potential risks.
ServiceNow has reported a serious security vulnerability in its AI Platform that could allow an unauthenticated user to impersonate another user and take actions on their behalf. This flaw, identified as CVE-2025-12420, has a high severity rating of 9.3 out of 10, indicating a significant risk to users. The potential for impersonation means that attackers could exploit this weakness to gain unauthorized access to sensitive information or perform harmful actions. Organizations using ServiceNow's AI Platform should prioritize applying the patch to mitigate this risk and protect their users. The quick response from ServiceNow in addressing this vulnerability is crucial to maintaining trust in their services.
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive for federal agencies to address a serious vulnerability in Gogs, an open-source Git service. This flaw has already been exploited in zero-day attacks, which means attackers took advantage of it before it was publicly known. Government systems using Gogs are particularly at risk, and CISA's mandate aims to prevent further exploitation. It's crucial for agencies to apply the necessary patches to protect their data and operations from potential breaches. Ignoring this could lead to significant security incidents, given the active nature of the attacks targeting this vulnerability.
Security Affairs
Meta has addressed a vulnerability in Instagram that allowed unauthorized parties to send password reset emails. This flaw raised concerns about potential account takeovers, as attackers could exploit it to gain access to user accounts. Despite claims of leaked data, Meta has denied any data breach, stating they have only fixed the reset issue. Users should be aware of this vulnerability, especially if they received unexpected password reset emails, as it indicates the possibility of malicious activity. It's important for users to enable additional security measures, such as two-factor authentication, to further protect their accounts.
Instagram recently addressed a vulnerability that allowed unauthorized third parties to send password reset emails to users. This issue raised concerns about user security and the potential for unauthorized access to accounts, which could lead to data breaches or identity theft. The platform has confirmed that they have fixed the flaw, but the incident highlights ongoing risks associated with account management and security on social media. Users are urged to remain vigilant and consider changing their passwords regularly to enhance their security. This incident serves as a reminder of the importance of robust security measures in protecting personal information online.
BleepingComputer
A significant security vulnerability, known as 'Ni8mare', has been discovered affecting nearly 60,000 instances of n8n, an open-source workflow automation tool. This flaw is classified as maximum severity, meaning it poses a serious risk to users who have not yet applied the necessary patches. The vulnerability could potentially allow attackers to exploit exposed instances, leading to unauthorized access or data breaches. As of now, many users remain unprotected, which raises concerns about the security of their automated workflows and sensitive data. It’s crucial for n8n users to address this issue immediately to prevent possible exploitation.
Instagram has recently addressed a vulnerability that enabled attackers to send mass password reset requests, which raised concerns about a potential data leak affecting over 17 million accounts. Although the company has denied that a data breach occurred, the incident has drawn attention to the security of user information on the platform. Users may have been at risk of having their account details scraped and shared online. This situation is particularly concerning as it highlights how easily attackers can exploit weaknesses in security systems to potentially access sensitive information. Instagram's prompt action to fix the issue is crucial, but it also serves as a reminder for users to secure their accounts with strong passwords and two-factor authentication.
The Illinois Department of Human Services (IDHS) recently reported a data breach affecting nearly 700,000 individuals. The breach resulted from misconfigured privacy settings that exposed sensitive personal and health information. IDHS became aware of the issue on September 22, 2025, when internal maps meant for internal use were inadvertently made accessible. This incident raises concerns about how government agencies handle sensitive data and the potential risks to affected residents, who may now face increased vulnerability to identity theft or other forms of misuse of their information. The IDHS is likely to face scrutiny over its data protection practices and the measures it will take to prevent future breaches.
SCM feed for Latest
Cisco has released updates to address a medium-severity vulnerability in its Identity Services Engine (ISE) and ISE Passive Identity Connector, identified as CVE-2026-20029. This flaw was brought to light following the publication of a proof-of-concept exploit, raising concerns about its potential exploitation. Organizations using these Cisco products are at risk, as the vulnerability could allow unauthorized access or manipulation of identity services. It’s crucial for affected users to apply the updates promptly to safeguard their networks and data from possible attacks. The quick response from Cisco highlights the ongoing need for vigilance in cybersecurity practices.